diff options
| author | Linus Torvalds <torvalds@linux-foundation.org> | 2014-01-28 11:38:04 -0500 |
|---|---|---|
| committer | Linus Torvalds <torvalds@linux-foundation.org> | 2014-01-28 11:38:04 -0500 |
| commit | bf3d846b783327359ddc4bd4f52627b36abb4d1d (patch) | |
| tree | c6b8fddbf04a2962dfcf9f487af25033f11b10b9 /fs/gfs2 | |
| parent | 54c0a4b46150db1571d955d598cd342c9f1d9657 (diff) | |
| parent | f6500801522c61782d4990fa1ad96154cb397cd4 (diff) | |
Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/viro/vfs
Pull vfs updates from Al Viro:
"Assorted stuff; the biggest pile here is Christoph's ACL series. Plus
assorted cleanups and fixes all over the place...
There will be another pile later this week"
* 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/viro/vfs: (43 commits)
__dentry_path() fixes
vfs: Remove second variable named error in __dentry_path
vfs: Is mounted should be testing mnt_ns for NULL or error.
Fix race when checking i_size on direct i/o read
hfsplus: remove can_set_xattr
nfsd: use get_acl and ->set_acl
fs: remove generic_acl
nfs: use generic posix ACL infrastructure for v3 Posix ACLs
gfs2: use generic posix ACL infrastructure
jfs: use generic posix ACL infrastructure
xfs: use generic posix ACL infrastructure
reiserfs: use generic posix ACL infrastructure
ocfs2: use generic posix ACL infrastructure
jffs2: use generic posix ACL infrastructure
hfsplus: use generic posix ACL infrastructure
f2fs: use generic posix ACL infrastructure
ext2/3/4: use generic posix ACL infrastructure
btrfs: use generic posix ACL infrastructure
fs: make posix_acl_create more useful
fs: make posix_acl_chmod more useful
...
Diffstat (limited to 'fs/gfs2')
| -rw-r--r-- | fs/gfs2/acl.c | 234 | ||||
| -rw-r--r-- | fs/gfs2/acl.h | 4 | ||||
| -rw-r--r-- | fs/gfs2/inode.c | 34 | ||||
| -rw-r--r-- | fs/gfs2/xattr.c | 4 |
4 files changed, 62 insertions, 214 deletions
diff --git a/fs/gfs2/acl.c b/fs/gfs2/acl.c index f69ac0af5496..ba9456685f47 100644 --- a/fs/gfs2/acl.c +++ b/fs/gfs2/acl.c | |||
| @@ -49,10 +49,6 @@ struct posix_acl *gfs2_get_acl(struct inode *inode, int type) | |||
| 49 | if (!ip->i_eattr) | 49 | if (!ip->i_eattr) |
| 50 | return NULL; | 50 | return NULL; |
| 51 | 51 | ||
| 52 | acl = get_cached_acl(&ip->i_inode, type); | ||
| 53 | if (acl != ACL_NOT_CACHED) | ||
| 54 | return acl; | ||
| 55 | |||
| 56 | name = gfs2_acl_name(type); | 52 | name = gfs2_acl_name(type); |
| 57 | if (name == NULL) | 53 | if (name == NULL) |
| 58 | return ERR_PTR(-EINVAL); | 54 | return ERR_PTR(-EINVAL); |
| @@ -80,7 +76,7 @@ static int gfs2_set_mode(struct inode *inode, umode_t mode) | |||
| 80 | return error; | 76 | return error; |
| 81 | } | 77 | } |
| 82 | 78 | ||
| 83 | static int gfs2_acl_set(struct inode *inode, int type, struct posix_acl *acl) | 79 | int gfs2_set_acl(struct inode *inode, struct posix_acl *acl, int type) |
| 84 | { | 80 | { |
| 85 | int error; | 81 | int error; |
| 86 | int len; | 82 | int len; |
| @@ -88,219 +84,49 @@ static int gfs2_acl_set(struct inode *inode, int type, struct posix_acl *acl) | |||
| 88 | const char *name = gfs2_acl_name(type); | 84 | const char *name = gfs2_acl_name(type); |
| 89 | 85 | ||
| 90 | BUG_ON(name == NULL); | 86 | BUG_ON(name == NULL); |
| 91 | len = posix_acl_to_xattr(&init_user_ns, acl, NULL, 0); | ||
| 92 | if (len == 0) | ||
| 93 | return 0; | ||
| 94 | data = kmalloc(len, GFP_NOFS); | ||
| 95 | if (data == NULL) | ||
| 96 | return -ENOMEM; | ||
| 97 | error = posix_acl_to_xattr(&init_user_ns, acl, data, len); | ||
| 98 | if (error < 0) | ||
| 99 | goto out; | ||
| 100 | error = __gfs2_xattr_set(inode, name, data, len, 0, GFS2_EATYPE_SYS); | ||
| 101 | if (!error) | ||
| 102 | set_cached_acl(inode, type, acl); | ||
| 103 | out: | ||
| 104 | kfree(data); | ||
| 105 | return error; | ||
| 106 | } | ||
| 107 | |||
| 108 | int gfs2_acl_create(struct gfs2_inode *dip, struct inode *inode) | ||
| 109 | { | ||
| 110 | struct gfs2_sbd *sdp = GFS2_SB(&dip->i_inode); | ||
| 111 | struct posix_acl *acl; | ||
| 112 | umode_t mode = inode->i_mode; | ||
| 113 | int error = 0; | ||
| 114 | |||
| 115 | if (!sdp->sd_args.ar_posix_acl) | ||
| 116 | return 0; | ||
| 117 | if (S_ISLNK(inode->i_mode)) | ||
| 118 | return 0; | ||
| 119 | |||
| 120 | acl = gfs2_get_acl(&dip->i_inode, ACL_TYPE_DEFAULT); | ||
| 121 | if (IS_ERR(acl)) | ||
| 122 | return PTR_ERR(acl); | ||
| 123 | if (!acl) { | ||
| 124 | mode &= ~current_umask(); | ||
| 125 | return gfs2_set_mode(inode, mode); | ||
| 126 | } | ||
| 127 | |||
| 128 | if (S_ISDIR(inode->i_mode)) { | ||
| 129 | error = gfs2_acl_set(inode, ACL_TYPE_DEFAULT, acl); | ||
| 130 | if (error) | ||
| 131 | goto out; | ||
| 132 | } | ||
| 133 | |||
| 134 | error = posix_acl_create(&acl, GFP_NOFS, &mode); | ||
| 135 | if (error < 0) | ||
| 136 | return error; | ||
| 137 | 87 | ||
| 138 | if (error == 0) | ||
| 139 | goto munge; | ||
| 140 | |||
| 141 | error = gfs2_acl_set(inode, ACL_TYPE_ACCESS, acl); | ||
| 142 | if (error) | ||
| 143 | goto out; | ||
| 144 | munge: | ||
| 145 | error = gfs2_set_mode(inode, mode); | ||
| 146 | out: | ||
| 147 | posix_acl_release(acl); | ||
| 148 | return error; | ||
| 149 | } | ||
| 150 | |||
| 151 | int gfs2_acl_chmod(struct gfs2_inode *ip, struct iattr *attr) | ||
| 152 | { | ||
| 153 | struct inode *inode = &ip->i_inode; | ||
| 154 | struct posix_acl *acl; | ||
| 155 | char *data; | ||
| 156 | unsigned int len; | ||
| 157 | int error; | ||
| 158 | |||
| 159 | acl = gfs2_get_acl(&ip->i_inode, ACL_TYPE_ACCESS); | ||
| 160 | if (IS_ERR(acl)) | ||
| 161 | return PTR_ERR(acl); | ||
| 162 | if (!acl) | ||
| 163 | return gfs2_setattr_simple(inode, attr); | ||
| 164 | |||
| 165 | error = posix_acl_chmod(&acl, GFP_NOFS, attr->ia_mode); | ||
| 166 | if (error) | ||
| 167 | return error; | ||
| 168 | |||
| 169 | len = posix_acl_to_xattr(&init_user_ns, acl, NULL, 0); | ||
| 170 | data = kmalloc(len, GFP_NOFS); | ||
| 171 | error = -ENOMEM; | ||
| 172 | if (data == NULL) | ||
| 173 | goto out; | ||
| 174 | posix_acl_to_xattr(&init_user_ns, acl, data, len); | ||
| 175 | error = gfs2_xattr_acl_chmod(ip, attr, data); | ||
| 176 | kfree(data); | ||
| 177 | set_cached_acl(&ip->i_inode, ACL_TYPE_ACCESS, acl); | ||
| 178 | |||
| 179 | out: | ||
| 180 | posix_acl_release(acl); | ||
| 181 | return error; | ||
| 182 | } | ||
| 183 | |||
| 184 | static int gfs2_acl_type(const char *name) | ||
| 185 | { | ||
| 186 | if (strcmp(name, GFS2_POSIX_ACL_ACCESS) == 0) | ||
| 187 | return ACL_TYPE_ACCESS; | ||
| 188 | if (strcmp(name, GFS2_POSIX_ACL_DEFAULT) == 0) | ||
| 189 | return ACL_TYPE_DEFAULT; | ||
| 190 | return -EINVAL; | ||
| 191 | } | ||
| 192 | |||
| 193 | static int gfs2_xattr_system_get(struct dentry *dentry, const char *name, | ||
| 194 | void *buffer, size_t size, int xtype) | ||
| 195 | { | ||
| 196 | struct inode *inode = dentry->d_inode; | ||
| 197 | struct gfs2_sbd *sdp = GFS2_SB(inode); | ||
| 198 | struct posix_acl *acl; | ||
| 199 | int type; | ||
| 200 | int error; | ||
| 201 | |||
| 202 | if (!sdp->sd_args.ar_posix_acl) | ||
| 203 | return -EOPNOTSUPP; | ||
| 204 | |||
| 205 | type = gfs2_acl_type(name); | ||
| 206 | if (type < 0) | ||
| 207 | return type; | ||
| 208 | |||
| 209 | acl = gfs2_get_acl(inode, type); | ||
| 210 | if (IS_ERR(acl)) | ||
| 211 | return PTR_ERR(acl); | ||
| 212 | if (acl == NULL) | ||
| 213 | return -ENODATA; | ||
| 214 | |||
| 215 | error = posix_acl_to_xattr(&init_user_ns, acl, buffer, size); | ||
| 216 | posix_acl_release(acl); | ||
| 217 | |||
| 218 | return error; | ||
| 219 | } | ||
| 220 | |||
| 221 | static int gfs2_xattr_system_set(struct dentry *dentry, const char *name, | ||
| 222 | const void *value, size_t size, int flags, | ||
| 223 | int xtype) | ||
| 224 | { | ||
| 225 | struct inode *inode = dentry->d_inode; | ||
| 226 | struct gfs2_sbd *sdp = GFS2_SB(inode); | ||
| 227 | struct posix_acl *acl = NULL; | ||
| 228 | int error = 0, type; | ||
| 229 | |||
| 230 | if (!sdp->sd_args.ar_posix_acl) | ||
| 231 | return -EOPNOTSUPP; | ||
| 232 | |||
| 233 | type = gfs2_acl_type(name); | ||
| 234 | if (type < 0) | ||
| 235 | return type; | ||
| 236 | if (flags & XATTR_CREATE) | ||
| 237 | return -EINVAL; | ||
| 238 | if (type == ACL_TYPE_DEFAULT && !S_ISDIR(inode->i_mode)) | ||
| 239 | return value ? -EACCES : 0; | ||
| 240 | if (!uid_eq(current_fsuid(), inode->i_uid) && !capable(CAP_FOWNER)) | ||
| 241 | return -EPERM; | ||
| 242 | if (S_ISLNK(inode->i_mode)) | ||
| 243 | return -EOPNOTSUPP; | ||
| 244 | |||
| 245 | if (!value) | ||
| 246 | goto set_acl; | ||
| 247 | |||
| 248 | acl = posix_acl_from_xattr(&init_user_ns, value, size); | ||
| 249 | if (!acl) { | ||
| 250 | /* | ||
| 251 | * acl_set_file(3) may request that we set default ACLs with | ||
| 252 | * zero length -- defend (gracefully) against that here. | ||
| 253 | */ | ||
| 254 | goto out; | ||
| 255 | } | ||
| 256 | if (IS_ERR(acl)) { | ||
| 257 | error = PTR_ERR(acl); | ||
| 258 | goto out; | ||
| 259 | } | ||
| 260 | |||
| 261 | error = posix_acl_valid(acl); | ||
| 262 | if (error) | ||
| 263 | goto out_release; | ||
| 264 | |||
| 265 | error = -EINVAL; | ||
| 266 | if (acl->a_count > GFS2_ACL_MAX_ENTRIES) | 88 | if (acl->a_count > GFS2_ACL_MAX_ENTRIES) |
| 267 | goto out_release; | 89 | return -EINVAL; |
| 268 | 90 | ||
| 269 | if (type == ACL_TYPE_ACCESS) { | 91 | if (type == ACL_TYPE_ACCESS) { |
| 270 | umode_t mode = inode->i_mode; | 92 | umode_t mode = inode->i_mode; |
| 93 | |||
| 271 | error = posix_acl_equiv_mode(acl, &mode); | 94 | error = posix_acl_equiv_mode(acl, &mode); |
| 95 | if (error < 0) | ||
| 96 | return error; | ||
| 272 | 97 | ||
| 273 | if (error <= 0) { | 98 | if (error == 0) |
| 274 | posix_acl_release(acl); | ||
| 275 | acl = NULL; | 99 | acl = NULL; |
| 276 | 100 | ||
| 277 | if (error < 0) | ||
| 278 | return error; | ||
| 279 | } | ||
| 280 | |||
| 281 | error = gfs2_set_mode(inode, mode); | 101 | error = gfs2_set_mode(inode, mode); |
| 282 | if (error) | 102 | if (error) |
| 283 | goto out_release; | 103 | return error; |
| 284 | } | 104 | } |
| 285 | 105 | ||
| 286 | set_acl: | 106 | if (acl) { |
| 287 | error = __gfs2_xattr_set(inode, name, value, size, 0, GFS2_EATYPE_SYS); | 107 | len = posix_acl_to_xattr(&init_user_ns, acl, NULL, 0); |
| 288 | if (!error) { | 108 | if (len == 0) |
| 289 | if (acl) | 109 | return 0; |
| 290 | set_cached_acl(inode, type, acl); | 110 | data = kmalloc(len, GFP_NOFS); |
| 291 | else | 111 | if (data == NULL) |
| 292 | forget_cached_acl(inode, type); | 112 | return -ENOMEM; |
| 113 | error = posix_acl_to_xattr(&init_user_ns, acl, data, len); | ||
| 114 | if (error < 0) | ||
| 115 | goto out; | ||
| 116 | } else { | ||
| 117 | data = NULL; | ||
| 118 | len = 0; | ||
| 293 | } | 119 | } |
| 294 | out_release: | 120 | |
| 295 | posix_acl_release(acl); | 121 | error = __gfs2_xattr_set(inode, name, data, len, 0, GFS2_EATYPE_SYS); |
| 122 | if (error) | ||
| 123 | goto out; | ||
| 124 | |||
| 125 | if (acl) | ||
| 126 | set_cached_acl(inode, type, acl); | ||
| 127 | else | ||
| 128 | forget_cached_acl(inode, type); | ||
| 296 | out: | 129 | out: |
| 130 | kfree(data); | ||
| 297 | return error; | 131 | return error; |
| 298 | } | 132 | } |
| 299 | |||
| 300 | const struct xattr_handler gfs2_xattr_system_handler = { | ||
| 301 | .prefix = XATTR_SYSTEM_PREFIX, | ||
| 302 | .flags = GFS2_EATYPE_SYS, | ||
| 303 | .get = gfs2_xattr_system_get, | ||
| 304 | .set = gfs2_xattr_system_set, | ||
| 305 | }; | ||
| 306 | |||
diff --git a/fs/gfs2/acl.h b/fs/gfs2/acl.h index 0da38dc7efec..301260c999ba 100644 --- a/fs/gfs2/acl.h +++ b/fs/gfs2/acl.h | |||
| @@ -17,8 +17,6 @@ | |||
| 17 | #define GFS2_ACL_MAX_ENTRIES 25 | 17 | #define GFS2_ACL_MAX_ENTRIES 25 |
| 18 | 18 | ||
| 19 | extern struct posix_acl *gfs2_get_acl(struct inode *inode, int type); | 19 | extern struct posix_acl *gfs2_get_acl(struct inode *inode, int type); |
| 20 | extern int gfs2_acl_create(struct gfs2_inode *dip, struct inode *inode); | 20 | extern int gfs2_set_acl(struct inode *inode, struct posix_acl *acl, int type); |
| 21 | extern int gfs2_acl_chmod(struct gfs2_inode *ip, struct iattr *attr); | ||
| 22 | extern const struct xattr_handler gfs2_xattr_system_handler; | ||
| 23 | 21 | ||
| 24 | #endif /* __ACL_DOT_H__ */ | 22 | #endif /* __ACL_DOT_H__ */ |
diff --git a/fs/gfs2/inode.c b/fs/gfs2/inode.c index 890588c7fb33..5c524180c98e 100644 --- a/fs/gfs2/inode.c +++ b/fs/gfs2/inode.c | |||
| @@ -571,6 +571,7 @@ static int gfs2_create_inode(struct inode *dir, struct dentry *dentry, | |||
| 571 | unsigned int size, int excl, int *opened) | 571 | unsigned int size, int excl, int *opened) |
| 572 | { | 572 | { |
| 573 | const struct qstr *name = &dentry->d_name; | 573 | const struct qstr *name = &dentry->d_name; |
| 574 | struct posix_acl *default_acl, *acl; | ||
| 574 | struct gfs2_holder ghs[2]; | 575 | struct gfs2_holder ghs[2]; |
| 575 | struct inode *inode = NULL; | 576 | struct inode *inode = NULL; |
| 576 | struct gfs2_inode *dip = GFS2_I(dir), *ip; | 577 | struct gfs2_inode *dip = GFS2_I(dir), *ip; |
| @@ -633,10 +634,14 @@ static int gfs2_create_inode(struct inode *dir, struct dentry *dentry, | |||
| 633 | if (!inode) | 634 | if (!inode) |
| 634 | goto fail_gunlock; | 635 | goto fail_gunlock; |
| 635 | 636 | ||
| 637 | error = posix_acl_create(dir, &mode, &default_acl, &acl); | ||
| 638 | if (error) | ||
| 639 | goto fail_free_vfs_inode; | ||
| 640 | |||
| 636 | ip = GFS2_I(inode); | 641 | ip = GFS2_I(inode); |
| 637 | error = gfs2_rs_alloc(ip); | 642 | error = gfs2_rs_alloc(ip); |
| 638 | if (error) | 643 | if (error) |
| 639 | goto fail_free_inode; | 644 | goto fail_free_acls; |
| 640 | 645 | ||
| 641 | inode->i_mode = mode; | 646 | inode->i_mode = mode; |
| 642 | set_nlink(inode, S_ISDIR(mode) ? 2 : 1); | 647 | set_nlink(inode, S_ISDIR(mode) ? 2 : 1); |
| @@ -704,7 +709,16 @@ static int gfs2_create_inode(struct inode *dir, struct dentry *dentry, | |||
| 704 | gfs2_set_iop(inode); | 709 | gfs2_set_iop(inode); |
| 705 | insert_inode_hash(inode); | 710 | insert_inode_hash(inode); |
| 706 | 711 | ||
| 707 | error = gfs2_acl_create(dip, inode); | 712 | if (default_acl) { |
| 713 | error = gfs2_set_acl(inode, default_acl, ACL_TYPE_DEFAULT); | ||
| 714 | posix_acl_release(default_acl); | ||
| 715 | } | ||
| 716 | if (acl) { | ||
| 717 | if (!error) | ||
| 718 | error = gfs2_set_acl(inode, acl, ACL_TYPE_ACCESS); | ||
| 719 | posix_acl_release(acl); | ||
| 720 | } | ||
| 721 | |||
| 708 | if (error) | 722 | if (error) |
| 709 | goto fail_gunlock3; | 723 | goto fail_gunlock3; |
| 710 | 724 | ||
| @@ -738,6 +752,12 @@ fail_free_inode: | |||
| 738 | if (ip->i_gl) | 752 | if (ip->i_gl) |
| 739 | gfs2_glock_put(ip->i_gl); | 753 | gfs2_glock_put(ip->i_gl); |
| 740 | gfs2_rs_delete(ip, NULL); | 754 | gfs2_rs_delete(ip, NULL); |
| 755 | fail_free_acls: | ||
| 756 | if (default_acl) | ||
| 757 | posix_acl_release(default_acl); | ||
| 758 | if (acl) | ||
| 759 | posix_acl_release(acl); | ||
| 760 | fail_free_vfs_inode: | ||
| 741 | free_inode_nonrcu(inode); | 761 | free_inode_nonrcu(inode); |
| 742 | inode = NULL; | 762 | inode = NULL; |
| 743 | fail_gunlock: | 763 | fail_gunlock: |
| @@ -1716,10 +1736,11 @@ static int gfs2_setattr(struct dentry *dentry, struct iattr *attr) | |||
| 1716 | error = gfs2_setattr_size(inode, attr->ia_size); | 1736 | error = gfs2_setattr_size(inode, attr->ia_size); |
| 1717 | else if (attr->ia_valid & (ATTR_UID | ATTR_GID)) | 1737 | else if (attr->ia_valid & (ATTR_UID | ATTR_GID)) |
| 1718 | error = setattr_chown(inode, attr); | 1738 | error = setattr_chown(inode, attr); |
| 1719 | else if ((attr->ia_valid & ATTR_MODE) && IS_POSIXACL(inode)) | 1739 | else { |
| 1720 | error = gfs2_acl_chmod(ip, attr); | ||
| 1721 | else | ||
| 1722 | error = gfs2_setattr_simple(inode, attr); | 1740 | error = gfs2_setattr_simple(inode, attr); |
| 1741 | if (!error && attr->ia_valid & ATTR_MODE) | ||
| 1742 | error = posix_acl_chmod(inode, inode->i_mode); | ||
| 1743 | } | ||
| 1723 | 1744 | ||
| 1724 | out: | 1745 | out: |
| 1725 | if (!error) | 1746 | if (!error) |
| @@ -1879,6 +1900,7 @@ const struct inode_operations gfs2_file_iops = { | |||
| 1879 | .removexattr = gfs2_removexattr, | 1900 | .removexattr = gfs2_removexattr, |
| 1880 | .fiemap = gfs2_fiemap, | 1901 | .fiemap = gfs2_fiemap, |
| 1881 | .get_acl = gfs2_get_acl, | 1902 | .get_acl = gfs2_get_acl, |
| 1903 | .set_acl = gfs2_set_acl, | ||
| 1882 | }; | 1904 | }; |
| 1883 | 1905 | ||
| 1884 | const struct inode_operations gfs2_dir_iops = { | 1906 | const struct inode_operations gfs2_dir_iops = { |
| @@ -1900,6 +1922,7 @@ const struct inode_operations gfs2_dir_iops = { | |||
| 1900 | .removexattr = gfs2_removexattr, | 1922 | .removexattr = gfs2_removexattr, |
| 1901 | .fiemap = gfs2_fiemap, | 1923 | .fiemap = gfs2_fiemap, |
| 1902 | .get_acl = gfs2_get_acl, | 1924 | .get_acl = gfs2_get_acl, |
| 1925 | .set_acl = gfs2_set_acl, | ||
| 1903 | .atomic_open = gfs2_atomic_open, | 1926 | .atomic_open = gfs2_atomic_open, |
| 1904 | }; | 1927 | }; |
| 1905 | 1928 | ||
| @@ -1915,6 +1938,5 @@ const struct inode_operations gfs2_symlink_iops = { | |||
| 1915 | .listxattr = gfs2_listxattr, | 1938 | .listxattr = gfs2_listxattr, |
| 1916 | .removexattr = gfs2_removexattr, | 1939 | .removexattr = gfs2_removexattr, |
| 1917 | .fiemap = gfs2_fiemap, | 1940 | .fiemap = gfs2_fiemap, |
| 1918 | .get_acl = gfs2_get_acl, | ||
| 1919 | }; | 1941 | }; |
| 1920 | 1942 | ||
diff --git a/fs/gfs2/xattr.c b/fs/gfs2/xattr.c index 8c6a6f6bdba9..0b81f783f787 100644 --- a/fs/gfs2/xattr.c +++ b/fs/gfs2/xattr.c | |||
| @@ -13,6 +13,7 @@ | |||
| 13 | #include <linux/buffer_head.h> | 13 | #include <linux/buffer_head.h> |
| 14 | #include <linux/xattr.h> | 14 | #include <linux/xattr.h> |
| 15 | #include <linux/gfs2_ondisk.h> | 15 | #include <linux/gfs2_ondisk.h> |
| 16 | #include <linux/posix_acl_xattr.h> | ||
| 16 | #include <asm/uaccess.h> | 17 | #include <asm/uaccess.h> |
| 17 | 18 | ||
| 18 | #include "gfs2.h" | 19 | #include "gfs2.h" |
| @@ -1500,7 +1501,8 @@ static const struct xattr_handler gfs2_xattr_security_handler = { | |||
| 1500 | const struct xattr_handler *gfs2_xattr_handlers[] = { | 1501 | const struct xattr_handler *gfs2_xattr_handlers[] = { |
| 1501 | &gfs2_xattr_user_handler, | 1502 | &gfs2_xattr_user_handler, |
| 1502 | &gfs2_xattr_security_handler, | 1503 | &gfs2_xattr_security_handler, |
| 1503 | &gfs2_xattr_system_handler, | 1504 | &posix_acl_access_xattr_handler, |
| 1505 | &posix_acl_default_xattr_handler, | ||
| 1504 | NULL, | 1506 | NULL, |
| 1505 | }; | 1507 | }; |
| 1506 | 1508 | ||
